<< back
Talks & Publications
> 2016
Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing
> 2017
R U aBLE? BLE Application Hacking
Break-a-ble: Hacking Your Smartphone with BLE
Hacking Bluetooth Low Energy Based Applications
Hack-a-ble: Hacking BLE Smart Devices
An Active Man-in-th-Middle Attack on Smart Devices
Hacking Bluetooth Low Energy Based Applications
> 2018
Battle of the Smarts
Does Serverless Means (mostly) Harmless?
Your Apps Have Gone Serverless. Has Your Security?
Your Apps Have Gone Serverless. Has Your Security?
Serverless Security: the untold story
Serverless Security: New World. New War.
Serverless Security: New World. New War.
v 2019
Serverless Top 10 Vulnerabilities
Serverless Security Top 10
OWASP Serverless Top 10
Damn Vulnerable Serverless Application (DVSA)
Injections Without Borders: An anatomy of Serverless Event Injections
Full Steam Ahead: Serverless Hacking 101
OWASP Serverless Top 10
Serverless Security Top 10 Risks
BASC: OWASP Serverless Top 10
OWASP Nashville: Serverless Security for Dummies
Serverless DevSecOps: Owning Security
Event Injections: Sending Evil to the Cloud
Alexa, Hack my Server(less) Please
> 2020
Stay tuned.
<< back